InUrFace 1337 Game Hacking/Modding presents: NEOGENESYS - a new breed of cheat.
Features:
-> Boxes/corner boxes/snaplines
-> Player info (distance, name, weapon)
-> Agent entities (guard dogs, squad mates, AI controlled juggernauts)
-> Missile entities (explosives, throwing knives)
-> Agent/missile info (distance, owner name, type)
-> Colors based on visibility/team/type (enemy visible, enemy hidden, friendly visible, friendly hidden, agent/missile)
Colors:
-> Enemy visible: red
-> Enemy hidden: yellow
-> Friendly visible: blue
-> Friendly hidden: green
-> Agent/missile: purple
Information:
This cheat is internal (.dll file) and must be injected into the game with the injector of your choice. Unlike external cheats, this one will work regardless of window mode. This cheat fully supports fullscreen mode and has no performance impact on the game itself. All drawing is done using the game's own engine functions, and therefore is free of external drawing libraries such as directx or opengl. The game is hooked by the .dll using a vectored exception handler hook which is much stealthier than detours and is the preferred method for call of duty games.
Screenshot:
Source of my hook:
Code:
#define OFF_CHATHEIGHT 0x1419A9788
#define OFF_DRAWCHATMESSAGES 0x14025C709
#define OFF_ADDTOTEAMCHAT 0x140286B7E
CHacks Hacks;
LPVOID VEH;
DWORD64 CHBackup;
LONG CALLBACK VEHHook(PEXCEPTION_POINTERS exception)
{
switch (exception->ContextRecord->Rip)
{
case OFF_DRAWCHATMESSAGES:
exception->ContextRecord->Rax = CHBackup;
return EXCEPTION_CONTINUE_EXECUTION;
case OFF_ADDTOTEAMCHAT:
exception->ContextRecord->Rax = CHBackup;
return EXCEPTION_CONTINUE_EXECUTION;
}
return EXCEPTION_CONTINUE_SEARCH;
}
void Initialize()
{
VEH = AddVectoredExceptionHandler(TRUE, VEHHook);
CHBackup = *(DWORD64*)OFF_CHATHEIGHT;
*(DWORD64*)OFF_CHATHEIGHT = 0x1;
}
void Deallocate()
{
*(DWORD64*)OFF_CHATHEIGHT = CHBackup;
RemoveVectoredExceptionHandler(VEH);
}
BOOL APIENTRY DllMain(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpvReserved)
{
switch (fdwReason)
{
case DLL_PROCESS_ATTACH:
Initialize();
return TRUE;
case DLL_PROCESS_DETACH:
Deallocate();
return TRUE;
}
return FALSE;
}
Virus scans:
https://www.virustotal.com/#/file/6f...dd43/detection
https://virusscan.jotti.org/en-US/fi...job/uyc4cwt1sw